Scalable and flexible information security for industrial automation

a technology for industrial automation and information security, applied in the field of industrial system automation, can solve the problems of affecting and the conventional factory floor security system is inflexible, so as to facilitate the implementation of zonal security, compromising performance and throughput, and compromising the security of other devices/processes

Active Publication Date: 2012-03-06
ROCKWELL AUTOMATION TECH
View PDF32 Cites 49 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0007]The subject invention provides systems and / or methodologies that facilitate implementing zonal security upon a factory floor. For example, it is often desirable on a factory floor to modify security regulations with respect to a single device, process cell, unit, etc. As discussed above, conventional factory floor security systems are inflexible, and require that an entire factory floor or a large portion thereof be subject to security modifications. Thus, for instance, even if only a single sub-process is desirably pulled offline and debugged, an entire factory floor must be pulled offline to facilitate such debugging, thereby compromising performance and throughput as well as security of other devices / processes. The subject invention allows a zone to be defined / determined, wherein security can be variably implemented and modified with respect to that zone while not requiring an entire factory floor to be subject to security modifications. The subject invention thus makes applications on a factory floor more efficient as well as more secure.
[0010]In accordance with another aspect of the present invention, various authentication techniques can be employed to render factory floor devices secure from security breaches. For example, conventional user names and passwords can be utilized to identify an operator and ensure that such operator has authority to implement the requested security modifications. Moreover, contextual data can be analyzed to determine whether security modifications are acceptable. For instance, a particular operator may have authority to modify security only at particular times and / or plant locations. Further, current factory floor actions can be analyzed to determine whether security modifications can be made. In another example, devices can be authenticated prior to implementing modified security procedures related thereto. Particularly, it could be catastrophic if security modifications were delivered to an incorrect device. Accordingly, variable levels of device authentication, such as digital signatures and certificates where keys can range from simple to complex, can be utilized in connection with the subject invention.

Problems solved by technology

As discussed above, conventional factory floor security systems are inflexible, and require that an entire factory floor or a large portion thereof be subject to security modifications.
Thus, for instance, even if only a single sub-process is desirably pulled offline and debugged, an entire factory floor must be pulled offline to facilitate such debugging, thereby compromising performance and throughput as well as security of other devices / processes.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Scalable and flexible information security for industrial automation
  • Scalable and flexible information security for industrial automation
  • Scalable and flexible information security for industrial automation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026]The subject invention is now described with reference to the drawings, wherein like reference numerals are used to refer to like elements throughout. In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the subject invention. It may be evident, however, that the subject invention may be practiced without these specific details. In other instances, well-known structures and devices are shown in block diagram form in order to facilitate describing the subject invention.

[0027]As used in this application, the terms “component,”“handler,”“model,”“system,” and the like are intended to refer to a computer-related entity, either hardware, a combination of hardware and software, software, or software in execution. For example, a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and / or a comp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A security system that relates to industrial automation security comprises a component that receives a request to modify security relating to a zone of a factory floor, the zone being less than an entirety of the factory floor. A zonal security component generates security procedures for the zone, the security procedures differ from security procedures implemented on the factory floor outside the zone.

Description

TECHNICAL FIELD[0001]The subject invention relates generally to industrial system automation, and more particularly to security relating to factory floor devices within the industrial system.BACKGROUND OF THE INVENTION[0002]Advancements in technology have allowed many factory environments to become partially or completely automated in many circumstances, thus improving output in terms of both quality and efficiency. For example, applications that once required workers to put themselves proximate to heavy machinery and other various hazardous conditions can now be completed at a safe distance from such hazards. Further, imperfections associated with human action have been minimized through employment of highly precise machines. Many of these factory devices supply data related to manufacturing to databases that are accessible by system / process / project managers on a factory floor. For instance, sensors can detect a number of times a particular machine has completed an operation given ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(United States)
IPC IPC(8): G06F17/00
CPCH04L63/10Y02P90/80
Inventor CHAND, SUJEETFARCHMIN, DAVID W.BAIER, JOHN J.KALAN, MICHAEL D.MARQUARDT, RANDALL A.MORSE, RICHARD A.BRIANT, STEPHEN C.
Owner ROCKWELL AUTOMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products